Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Klibc
(Klibc_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-04-30 | CVE-2021-31873 | An issue was discovered in klibc before 2.0.9. Additions in the malloc() function may result in an integer overflow and a subsequent heap buffer overflow. | Debian_linux, Klibc | 9.8 | ||
2021-04-30 | CVE-2021-31870 | An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow. | Debian_linux, Klibc | 9.8 | ||
2021-04-30 | CVE-2021-31871 | An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems. | Debian_linux, Klibc | 7.5 | ||
2021-04-30 | CVE-2021-31872 | An issue was discovered in klibc before 2.0.9. Multiple possible integer overflows in the cpio command on 32-bit systems may result in a buffer overflow or other security impact. | Debian_linux, Klibc | 9.8 | ||
2019-11-14 | CVE-2011-1930 | In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options. | Debian_linux, Klibc | N/A |